Tue.Feb 14, 2023

article thumbnail

Chinese Threat Group Leaks Hacking Secrets in Failed Attack

Data Breach Today

The Tonto Team Used Spear-Phishing Emails to Target Group-IB Employees Group-IB says a July 2022 spear-phishing attempt on its own employees came from the Chinese threat actor known variously as Tonto Team and CactusPete. Tonto Team may be a unit of China's People's Liberation Army. Malwarebytes says the group has ramped up spying against Russian government agencies.

Phishing 330
article thumbnail

SHARED INTEL: The expect impacts of Pres. Biden’s imminent National Cybersecurity Strategy

The Last Watchdog

The United States will soon get some long-awaited cybersecurity updates. Related: Spies use Tik Tok, balloons That’s because the Biden administration will issue the National Cyber Strategy within days. Despite lacking an official published document, some industry professionals have already seen a draft copy of the strategic plan and weighed in with their thoughts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spanish Police Bust Phishing Ring That Defrauded Thousands

Data Breach Today

Group Targeted American Victims and Pocketed Over 5 Million Euros Police busted nine members of a cyber fraud gang that targeted mainly Americans. Spanish police arrested eight members, and U.S. authorities arrested one. In less than a year, the ring pocketed 5 million euros in scammed funds, say the Spanish National Police.

Phishing 269
article thumbnail

Cybercriminals are Using Geotargeted Phishing to Target Victims

KnowBe4

Attackers are abusing a legitimate service called “GeoTargetly” to launch localized phishing attacks, according to Jeremy Fuchs at Avanan. GeoTargetly is meant to be used by advertisers to display ads in countries’ local languages. Avanan observed a phishing campaign that’s using phishing emails to target multiple countries in South America.

Phishing 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CHS: 1 Million Patients Affected by GoAnyWhere MFT Hack

Data Breach Today

Community Health Systems Reports Data Breach in SEC Filing Community Health Systems has reported to the U.S. Securities and Exchange Commission that a security incident involving vendor Fortra's GoAnyWhere secure file transfer software has compromised the data of about 1 million patients. Did attackers exploit a recent zero-day vulnerability?

More Trending

article thumbnail

6 Networks Named in Nationwide Health Data Exchange Effort

Data Breach Today

First Applicants Approved for Participation in HHS' National TEFCA Network Federal regulators said true health data interoperability is on its way for hundreds of millions of American patients now that six tech providers have committed to a rigorous set of trust and security criteria for swapping patient information. The agreement is a milestone years in the making.

Security 141
article thumbnail

OT Network Security Myths Busted in a Pair of Hacks

Dark Reading

How newly exposed security weaknesses in industrial wireless, cloud-based interfaces, and nested PLCs serve as a wake-up call for hardening the physical process control layer of the OT network.

Security 105
article thumbnail

Sanctioned Crypto Mixer Blender Reappears Under New Name

Data Breach Today

'Sinbad' Is Likely Run by Operators of Blender and Links to the Same Digital Wallet A cryptocurrency service that North Korean hackers used to launder stolen funds and that was sanctioned by the U.S. Department of the Treasury appears to have resumed as "Sinbad." It has laundered almost $100 million in bitcoin from hacks by Lazarus Group, says blockchain analysis firm Elliptic.

article thumbnail

9 New Microsoft Bugs to Patch Now

Dark Reading

78 new CVEs patched in this month's batch — nearly half of which are remotely executable and three of which attackers already are exploiting.

115
115
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Importance of a Return to Office Records Compliance Plan

Record Nations

The COVID-19 pandemic launched one of the largest experiments the workplace has ever seen. Businesses sent millions of people home. Companies scrambled to provide their workers with the resources they needed to work anywhere. Records and data, previously contained in-office, were spread across the globe. Now, as those offices fill with people and records again, […] The post The Importance of a Return to Office Records Compliance Plan appeared first on Record Nations.

article thumbnail

The Man Who Would Be King: Rudyard Kipling, Freemasonry and the Perils of New Historicism

Information Governance Perspectives

Rudyard Kipling was revered as a literary giant in his lifetime. His talents were even compared to those of Shakespeare by renowned philosophers such as William James. But for a few decades now, the author's Marxist critics, especially those loyal to the poetics of new historicism, have treated the writer and his exotic stories with utter contempt and disdain.

96
article thumbnail

Automated Security and Compliance Attracts Venture Investors

eSecurity Planet

In 2013, Adam Markowitz founded Portfolium, an edtech startup that matched college students and graduates with employers. “I remember the first time we were asked for a SOC 2 report, which quickly became the minimum bar requirement in our industry for proof of an effective security program,” he said. The process for creating the report was time-consuming, manual and costly.

article thumbnail

The Man Who Would Be King: Rudyard Kipling, Freemasonry and the Perils of New Historicism

Information Governance Perspectives

Rudyard Kipling was revered as a literary giant in his lifetime. His talents were even compared to those of Shakespeare by renowned philosophers such as William James. But for a few decades now, the author's Marxist critics, especially those loyal to the poetics of new historicism, have treated the writer and his exotic stories with utter contempt and disdain.

95
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What Will It Take?

Schneier on Security

What will it take for policy makers to take cybersecurity seriously? Not minimal-change seriously. Not here-and-there seriously. But really seriously. What will it take for policy makers to take cybersecurity seriously enough to enact substantive legislative changes that would address the problems? It’s not enough for the average person to be afraid of cyberattacks.

IT 92
article thumbnail

Configuration Issues in SaltStack IT Tool Put Enterprises at Risk

Dark Reading

Researchers flag common misconfiguration errors and a template injection technique that could let an attacker take over the IT management network and connected systems.

IT 94
article thumbnail

Cloudflare blocked record-breaking 71 million request-per-second DDoS attack

Security Affairs

Cloudflare mitigated a record distributed denial-of-service (DDoS) that reached 71 Million requests per second. Cloudflare announced it has mitigated a record hyper-volumetric distributed denial-of-service (DDoS) attack that peaked at over 71 million requests per second (RPS). The company pointed out that this is the largest reported HTTP distributed denial-of-service attack on record, the volume was more than 35% higher than the previously reported record of 46M rps that was mitigated in June 2

Cloud 87
article thumbnail

CyberheistNews Vol 13 #07 [Scam of the Week] The Turkey-Syria Earthquake

KnowBe4

CyberheistNews Vol 13 #07 | February 14th, 2023 [Scam of the Week] The Turkey-Syria Earthquake Just when you think they cannot sink any lower, criminal internet scum is now exploiting the recent earthquake in Turkey and Syria. Less than 24 hours after two massive earthquakes claimed the lives of tens of thousands of people, cybercrooks are already piggybacking on the horrible humanitarian crisis.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft Patch Tuesday for February 2023 fixed actively exploited zero-days

Security Affairs

Microsoft Patch Tuesday security updates for February 2023 addressed 75 flaws, including three actively exploited zero-day bugs. Microsoft Patch Tuesday security updates for February 2023 fixed 75 vulnerabilities in multiple products, including Microsoft Windows and Windows Components; Office and Office Components; Exchange Server; NET Core and Visual Studio Code; 3D Builder and Print 3D; Microsoft Azure and Dynamics 365; Defender for IoT and the Malware Protection Engine; and Microsoft Edge (Ch

article thumbnail

Lessons All Industries Can Learn From Automotive Security

Dark Reading

Industry standards must evolve as digital transformation makes all companies software companies. Security testing boosts development speed and software quality.

article thumbnail

The Tor network hit by wave of DDoS attacks for at least 7 months

Security Affairs

Tor Project maintainers revealed that for at least 7 months, the Tor network was hit by several different waves of ongoing DDoS attacks. During the last months Tor users have experienced Tor network performance issues lately, Tor Project maintainers explained that they were caused by different waves of ongoing DDoS attacks. Tor Project’s Executive Director Isabela Dias Fernandes explained that the methods and targets of the attacks have continuously changed over time.

Access 78
article thumbnail

Why SecDataOps Is the Future of Your Security Program

Dark Reading

The goal: Ensure that data is always finely curated and accessible, and that security decisions get made with high-fidelity data.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

AdSense fraud campaign relies on 10,890 sites that were infected since September 2022

Security Affairs

The threat actors behind a massive AdSense fraud campaign infected 10,890 WordPress sites since September 2022. In November 2022, researchers from security firm Sucuri reported to have tracked a surge in WordPress malware redirecting website visitors to fake Q&A sites via ois[.]is. The experts were tracking the campaign since September 2022, the campaign’s end goal was black hat SEO aimed at increasing the reputation of the attacker’s sites.

CMS 73
article thumbnail

Hospitals Sued for Using Meta's Ad-Tracking Code, Violating HIPAA

Dark Reading

Lawsuits say hospitals using Meta Pixel code violated patient privacy — sharing conditions, medications, and more with Facebook.

Privacy 93
article thumbnail

What is Virtual Patching and How Does It Work?

eSecurity Planet

Virtual patching uses policies, rules and security tools to block access to a vulnerability until it can be patched. Zero-day threats and legacy systems are two ways that vulnerabilities can be created for which no patch may exist for some time, if ever. In those cases, security teams can block a potential attack path until a permanent fix can be found.

IT 75
article thumbnail

Experts discover over 451 clipper malware-laced packages in the PyPI repository

Security Affairs

Threat actors published more than 451 unique malware-laced Python packages on the official Python Package Index (PyPI) repository. Phylum researchers spotted more than 451 unique Python packages on the official Python Package Index (PyPI) repository in an attempt to deliver clipper malware on the developer systems. According to the experts, the activity is still ongoing and is part of a malicious campaign that they discovered on November 2022.

IT 69
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The More You Look for Spy Balloons, the More UFOs You’ll Find

WIRED Threat Level

No, there’s not a sudden influx of unidentified objects in the skies above the US—but the government is paying closer attention.

article thumbnail

Expel Tackles Cloud Threats With MDR for Kubernetes

Dark Reading

The new managed detection and response platform simplifies cloud security for Kubernetes applications.

Cloud 90
article thumbnail

As AI Moves In, Let’s Not Forget Why We Like People

John Battelle's Searchblog

Maybe we like having a produce guy after all. Given the news around AI’s impact on the tech industry, search, and jobs in general, I thought it made sense to re-up a piece I wrote back in 2018, triggered at the time by the launch of Amazon Go (which, not surprisingly, did not exactly go as Amazon might have wished ). I re-read it recently and thought it held up pretty well (and I’ve been on the road for over a week, so fresh pieces will have to wait for a few more days!).